Solved

Where is the policy in XP that limits access to a users desktop settings?

Posted on 2003-10-24
4
198 Views
Last Modified: 2013-12-04
I don't want the 'hosers' account on my box here to be able to modyfy their desktop settings. The jackasses keep putting porno as the background. That would be all fine and dandy, but I don't much like it when I have girls come over and see a huge vagina plastered on my screen.

Where is the policy hiding that will make it so I can lock them out of the settings? I've seen it done before, I've no idea where to go for it though.

Thanks in advance -Souter

Also.. Is there a good site out there with policy tutorials? I'm rather new to this security aspect of Windows 2000/XP
0
Comment
Question by:Sootah
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 1

Accepted Solution

by:
Tank400 earned 125 total points
ID: 9623851
Hi

Go to run and type in gpedit.msc this is where you can lockdown all sorts of things it’s quite easy to use.

Then select “Administrative Templates” then “Control Panel” then “Display” double click on the “Prevent changing wallpaper” option and select enabled this will then stop anyone from changing the background

Hope this helps

0
 
LVL 2

Author Comment

by:Sootah
ID: 9623861
Bump
0
 
LVL 1

Expert Comment

by:Tank400
ID: 9625430
hi sootah

has this solved your problem?

tank
0
 

Expert Comment

by:procermic
ID: 9639394
sootah,

Try this site for some information on security policy, read read read.,

http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/winxppro/proddocs/LPE_topnode.asp

procermic
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question